Ben Obrien 10N ICT homework 6 6th November. The ‘Yaha.K’ Email Virus The spread of the Windows e-mail worm, called Yaha.K, has led anti-virus firms to.

Slides:



Advertisements
Similar presentations
V r u s e s and hackers By Anita OwerehBy Anita OwerehBy Anita OwerehBy Anita Owereh.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
AO Made Easy Your guide to using on your office placement.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Online Annoyances Spam – electronic junk mail
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By Ksenia Primizenkina 8K
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
Unit 2 Information gathering techniques Short Term Goal: To employ appropriate information gathering techniques to accurately assess pupils current online.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
Types of Electronic Infection
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Virus Hits Wikipedia The virus writers created a page on the German Wikipedia that linked to a fake fix for a new version of an old malicious Windows worm.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Computer Skills and Applications Computer Security.
By: Atheer, Kristelle and jia. Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Viruses. Learning Objectives: At the end of this lesson you should be able to:
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Information Systems Design and Development Security Risks Computing Science.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
What devices use the internet?
Presentation transcript:

Ben Obrien 10N ICT homework 6 6th November

The ‘Yaha.K’ Virus The spread of the Windows worm, called Yaha.K, has led anti-virus firms to classify it as a high risk. The virus has now been reported in 100 countries, predominantly in the UK and the Netherlands, according to Message Labs which scans messages for viruses. It spreads by ing itself to everyone in your address book. It may also try to shut down anti-virus programs. Computer users are being advised to delete any suspect s they receive, as well as updating their anti- virus software.

Fake FBI Virus Catches Users An was going around in America that claimed it was from the FBI. It claimed that the person who the mail was sent to had been visiting illegal sites and the FBI had detected it. It asked them to complete a questionnaire and return the with it. Once the person had opened the questionnaire attachment, they would be infected by the virus. As soon as it was opened it would plunder your address in order to send itself to other victims.

‘Fizzer’ Virus The mass-mailing worm, dubbed Fizzer, was rapidly infecting computers using the Windows operating system in Asia, Europe and the US. Experts said it was a complex virus which can disable anti-virus software, steal passwords typed on a keyboard and even open a back door to a computer. People were advised to update their anti-virus software and be wary of s from unknown sources.